Imatag

Imatag

IMATAG
+
+

Related Products

  • NinjaOne
    3,945 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,195 Ratings
    Visit Website
  • DriveStrike
    23 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,482 Ratings
    Visit Website
  • Carbide
    88 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website
  • Bitdefender Ultimate Small Business Security
    3 Ratings
    Visit Website
  • Safetica
    401 Ratings
    Visit Website
  • Google Chrome Enterprise
    2,034 Ratings
    Visit Website
  • NetBrain
    218 Ratings
    Visit Website

About

Prevent attacks by locking down all authorized actions and prevent leaked or stolen data from being read. Invisibly, automatically, without fail. SDS helps you focus your endpoint security efforts on what you can positively control instead of chasing the latest malware variant or trying to train your users to be security experts. Shinobi Defense System is a unique integrated portfolio of proven technologies now available for the first time in the USA. SDS invisibly protects against the top 3 hardest and most prevalent endpoint security problems driving business losses. We combine DeepWhite, the strongest whitelist-based protection technology, and Evolution DLP, a seamless and automatic data loss protection solution, into one integrated system that is powered by our patented Active Intercept engine and Shinobi Forensics logging and reporting platform. Invisibly prevents any leaked or stolen files from being read. Zero end user rules or interaction needed.

About

IMATAG protects your visual content online, such as product images, brand visuals, licensed content, or sensitive files. Based on a patented technology of Invisible Watermark (or Forensic Watermark), it comes in two flavors: - IMATAG LEAKS, the first online solution for the identification of photo or video leaks, - and IMATAG MONITOR, the most reliable visual search solution to track the use of your content on the internet. How it works: The software discreetly places an imperceptible identifier at the pixel level of images or videos. This invisible watermark allows to identify your content on the web regardless if it has been resized, cropped or trimmed, posted on social media or copied via a screenshot. Used as a tracker, it is also able to trace the origin of a leak. Supports images (photos, renders, design), videos, and PDF. Available as SaaS via Web UI or API, or on premise software.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Companies seeking a solution to prevent attacks by locking down all authorized actions

Audience

Brands, newswires, photo agencies, corporates

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Humming Heads
Founded: 1999
Japan
www.hummingheads.co.jp/english/index.html

Company Information

IMATAG
Founded: 2015
France
www.imatag.com

Alternatives

Imatag

Imatag

IMATAG

Alternatives

LEAKBLOCK

LEAKBLOCK

LeakBlock.io
MyDLP

MyDLP

Comodo Group
xSecuritas

xSecuritas

xSecuritas, Inc

Categories

Categories

Data Loss Prevention Features

Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting

Vulnerability Management Features

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Data Loss Prevention Features

Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting

Brand Protection Features

Case Management
Domain Monitoring
Investigation Management
Marketplace Monitoring
Mobile App Monitoring
Paid Search Monitoring
Prioritization
Social Media Monitoring

Digital Rights Management Features

Access Revocation
Audio / Video Protection
Distribution Management
Expiration Management
Image Protection
License Management
Location Control
PDF Protection
Software Application Protection
Subscription Management
Usage Tracking / Analytics
Watermarking

Public Relations Features

Article Author Database
Auto-Update Media Lists
Campaign Management
Clippings Management
Communications Calendar
Contact Management
Digital Asset Management
Direct Mail Management
Email Distribution
Press Monitoring
Press Release Builder

Reputation Management Features

Campaign Management
Gamification
Response Management
Review Generation
Review Monitoring
Sentiment Analysis
Social Media Metrics
Social Media Monitoring
White Label

Visual Search Features

Barcode Recognition
Catalog Management
Customer Activity Tracking
Filtering
Image Tagging
IP Protection
Mobile App
Optical Character Recognition
Product Recommendations
Product Search
Reverse Image Search
Video Search

Integrations

Scrile Connect
Wedia

Integrations

Scrile Connect
Wedia
Claim Humming Heads and update features and information
Claim Humming Heads and update features and information
Claim Imatag and update features and information
Claim Imatag and update features and information